2. SCQF level: Choose 3. SCQF credit value ECTS credit value: 10
|
|
- Felicity Murphy
- 5 years ago
- Views:
Transcription
1 Module Descriptor Part one: Module leader s section: core module details 1. Module title: Network Security and Cryptography 2. SCQF level: Choose 3. SCQF credit value ECTS credit value: Module code CSN09xxx 6. Module leader: Prof. Bill Buchanan 7. School: Computing 8. Napier subject area: Computer Systems (CSY) 9. Prerequisites To study this modules you will need the learning equivalent to the module listed or to have passed this module Module code CSN08102 Module title Practical Networks 2 Examples of equivalent learning Level 8 equivalent networking-related module or module in software development. 10. What you will learn and what this module is about Security is a major concern in technological developments and in business development. This module provides a deep understanding of some key fundamental areas of security, and aims to provide a foundation of the key principles and practiced used in network security and in cryptography. The module uses an advanced cloud infrastructure to virtualize the labs, using both public clouds (including Amazon EC2 and Azure) along with a private cloud. It also has full on-line lectures and a range of related challenges. The main focuses is on: - Network security architectures and devices. - Codes and code cracking. - Network protocols. The module uses an advanced website ( which outlines a wide range of security principles, and provides ever-changing on-line challenges. Overall the module presents material to computing-related students, no matter their future intentions, background, or programme, and aims to provide fundamental areas of security in a fun and interesting way. 11. Description of module content The aim of the module is to develop a deep understanding network security and cryptography, that will allow graduates to act professionally in the design, analysis, implementation, and reporting related to network security. An outline of the main areas includes: - Network Architectures and Network Device Configuration. Robust, scaleable and secure architectures. Firewalls/IDS/IPS/Log/DMZ Configuration. - Hosts, servers and services. Configuration of the range of hosts, services and servers used in network architectures, including covering related test/debug tools. Intrusion Detection Systems. Techniques, Snort, IDS Rules, Distributed/Agent-based, Signature/Anomaly detection, APT, and signature generation. - Cloud/grid computing. Principles, virtualisation, distributed architectures, dynamic infrastructures, and layered approaches. - Introduction to Network Protocols/Forensics. - Secret Codes. Substitution codes, key-based codes, secret sharing, and a wide range of methods. - Encryption. Prime Numbers, Weaknesses, Public/private key, CBC/ECB. Coverage of methods: RSA, AES, ElGamal, and so on. - Key exchange methods. Diffie-Hellman, Kerberos, and so on. - Hashing methods. Including MD5, SHA-1, and so on. Adding Salt. Collisions, One-time passwords. - Authentication methods. Authentication methods, Identity Architectures, Digital Certificates. 1
2 - Data Integrity. Checksums, Message Authentication Codes (MACs), CRC-32, and other associated methods. - Code cracking methods. Brute force, rainbow methods, parallel processing, Man-in-the-middle, known weaknesses. 12. Learning Outcomes for module On completion of this module, students will be able to: L1: Develop an advanced knowledge of key security/cryptography principles and methods. L2: Understand the key academic principles and practical skills required to build security architectures. L3: Design, implement, evaluate and critically analyse a system to a given set of security requirements 13. Indicative References and Reading List T1: Buchanan WJ, Security and Network Forensics, Auerbach Publishers Inc., 2009, ISBN X. T2: Buchanan WJ, Advanced Cloud and Virtualisation, CRC Press, Sept 2014, ISBN T3: asecuritysite.com Part two: Module leader s section: Versions 14. Occurrence: 14a. Primary mode of delivery: Blended 14b. Location of delivery: Scotland Partner: N/A Napier Delivery Other partner (if more than one using same version): 14c. Member of staff with primary responsibility for delivering module, if different from module leader: 15. WebCT presence Please select one: 1. This version of the module does not require a WebCT presence. 2. This version of the module requires a WebCT presence that is not shared with any other versions. 3. This version of the module requires a WebCT presence that is shared with other versions (give details): 16. LTA approach Learning & teaching methods including their alignment to LOs The coursework will involve the design, implementation, evaluation and critical analysis of a system to a given set of security requirements [L3]. The module will use an advanced cloud infrastructure which virtualises hosts and devices, and allows complex network architectures to be created. The Asecuritysite Web package contains a completely managed learning environment, where the students can track their performance. Embedding of employability/ PDP/ scholarship skills The module uses industry-standard methods, protocols, equipment and software. Assessment (formative and summative) There will be two methods of assessment: Coursework [5]. This relates to a coursework on the design, implementation, evaluation and critical analysis of a prototype of a secure/digital forensics system, based on a range of requirements. On-line tests [5]: This involves two on-line tests which cover the key areas of network security and cryptography. Research/ teaching linkages The main research group involved in this area has an excellent foundation in research related to security and digital forensics (Centre for Distributed Computing and Security). It has several researchers working in this area, including on the performance evaluation of security devices, enhanced digital forensic frameworks, and in e-crime. The group also has patents related to next-generation digital forensic system, and works with many industrial companies on security and digital forensics. There are also links with the different domains 2
3 such as with the NHS, the Scottish Police, the FSA, and other industrial partners. The module also uses a state-of-the-art teaching framework, which has been published in educational journals and conferences (Buchanan, 2006). Ref: Buchanan WJ, Correlation between academic and skills-based tests in computer networks, British Journal of Educational Technology, -. doi: /j x, Vol 37, No 1, 2006, pp Supporting equality and diversity The technology can be used by any student, and there are no barriers to equality or diversity. The material will be available in a wide range of formats, including a printed version, and an electronic version. All the lectures will be available on-line, and a narrative of the material covered in the lecture. and MSN Messenger support is also available to allow remote working. Student can work at their own pace through the Asecuritysite Web infrastructure, and gain formative feedback on their performance. Internationalisation The module uses equipment, techniques, technologies, and methodologies that are standard across the World. Security is also a major issue around the World, and students should be able to understand how a secure system can span across large-areas, and over different countries and continents. 17. Student Activity (NESH) L&T activity NESH Face-to-face Lecture 24 Face-to-face Practicals/Labs 24 Independent learning Individual learning activities 152 TOTAL NESH = 200 hours 18. Assessment Week Type of assessment Weighting LOs covered Length/ volume Component: Assessment One Enter assessment element(s): 8,12 Digital exam 5 1,2 2 hours 14 Project hours Component subtotal: 10 Component: Assessment Two Enter assessment element(s): Component subtotal: Module total: 10 3
4 19. Length of module delivery. Over how many trimesters is this module delivered? One Two Three See Guidance Note Trimester(s) of delivery. TR2 Admin use 21. Approval Date of approval Date of approval commencement Final date of review 22. External examiner s name 23. Main Administrator s name Fiona Sutherland, Assistant Faculty Manager, School of Computing 24. Notes for administrative use only Admin use (for each version) 24. Exemptions awarded from regulations 4
5 5
SUMMARY OF INFORMATION ON EACH COURSE
1. Name of Course Applied Cryptography 2. Course Code TAC 3121 3. Status of Course Specialisation Core for B.IT Security Technology [Applies to (cohort) ] 4. MQF Level/Stage Note : Certificate MQF Level
More informationSQA Advanced Unit specification: general information for centres
SQA Advanced Unit specification: general information for centres Unit title: Cloud Computing Unit code: HP1Y 47 Superclass: CE Publication date: August 2017 Source: Scottish Qualifications Authority Version:
More informationModule Definition Form (MDF)
Module Definition Form (MDF) Module code: MOD005618 Version: 1 Date Amended: 25/Nov/2016 1. Module Title Object Orientated Modelling and Data Design 2a. Module Leader Peter Sun 2b. Department Department
More informationWireless LANs (CO72047)
W.Buchanan (1) (c) buchanan Teaching Team W.Buchanan (2) Dr WJ Buchanan, Module Leader, Reader. Group Leader, DSMA (Dist. Sys. and Mobile Agents) Dr Imed Romdhani, Lecturer. Specialist in Wireless and
More informationProgramme Specification
Programme Specification BSc Honours Forensic Computing 1. Awarding institution Middlesex University 2. Teaching institution Middlesex University 3. Programme accredited by 4. Final qualification BSc Honours
More informationSchool of Engineering and the Built Environment Glasgow Caledonian University
School of Engineering and the Built Environment Glasgow Caledonian University MSc Advanced Computer Networking Programme Specification Document Session 2015-16 Programme Specification Pro-forma (PSP) 1.
More informationFaculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science
School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science for Business Academic Year: 2017/18 Degree
More information(FHEQ) level 6] 3 years full-time; 4 years full-time including a year of study abroad and/or work placement. I301 (4-years) Computing, Engineering
Faculty of Engineering and Informatics Programme Specification Programme title: BEng (Hons) Software Engineering Academic Year: 2018/19 Degree Awarding Body: Partner(s), delivery organisation or support
More informationMASTER OF SCIENCE IN COMPUTER SCIENCE
THE UNIVERSITY OF ZAMBIA SCHOOL OF NATURAL SCIENCES DEPARTMENT OF COMPUTER STUDIES MASTER OF SCIENCE IN COMPUTER SCIENCE November 2014 1) BACKGROUND From the inception of Computer Science programmes at
More informationProgramme Specification
Programme Specification Awarding Body/Institution Teaching Institution Queen Mary University of London Queen Mary University of London Name of Final Award and Programme Title Certificate in Intellectual
More informationSchool of Engineering and Built Environment. MSc/PgD Big Data Technologies. Programme Specification
School of Engineering and Built Environment MSc/PgD Big Data Technologies Programme Specification 10 th May 2016 PROGRAMME SPECIFICATION PRO-FORMA - POSTGRADUATE 1 General Information 1. Programme Title:
More informationMSc Management with Project Management. BS524 (with PDP) Postgraduate Diploma in Management. January 2016 January 2021.
PROGRAMME APPROVAL RECORD AND CERTIFICATE (PARC) PART 1 - GENERAL INFORMATION Programme title Award title Awarding Body/Institution Teaching Institution (if different) Language of Study UCAS Code Programme
More informationCryptography and Network Security
Cryptography and Network Security Spring 2012 http://users.abo.fi/ipetre/crypto/ Lecture 14: Folklore, Course summary, Exam requirements Ion Petre Department of IT, Åbo Akademi University 1 Folklore on
More informationFaculty of Engineering and Informatics. Programme Specification. School of Electrical Engineering and Computer Science. Academic Year: 2017/18
School of Electrical Engineering and Computer Science Programme Specification Faculty of Engineering and Informatics Programme title: BSc (Hons) Computer Science Academic Year: 2017/18 Degree Awarding
More informationProgramme Specification. MSc Telecommunications Engineering 2016/17
School of Engineering and the Built Environment Glasgow Caledonian University Programme Specification MSc Telecommunications Engineering 2016/17 1 Programme Specification Pro-forma 1. GENERAL INFORMATION
More informationStudy Abroad Programme
MODULE SPECIFICATION UNDERGRADUATE PROGRAMMES KEY FACTS Module name Module code School Department or equivalent Networks and Operating Systems IN2011 Mathematics, Computer Science and Engineering Department
More informationCourse Specifications M. Tech. / PG Diploma Programme
Course Specifications M. Tech. / PG Diploma Programme Faculty of Engineering & Technology M. S. Ramaiah University of Applied Sciences University House, New BEL Road, MSR Nagar, Bengaluru 560 054 www.msruas.ac.in
More informationSTUDENT AND ACADEMIC SERVICES
PROGRAMME SPECIFICATION Part 1: Information Awarding Institution Teaching Institution Delivery Location Study abroad / Exchange / Credit recognition Faculty responsible for programme Department responsible
More informationKEY PROGRAMME INFORMATION. Originating institution(s) Bournemouth University. Faculty responsible for the programme Faculty of Science and Technology
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationBS523 (with PDP) Postgraduate Diploma in Management. January 2016 January September 2017
PROGRAMME APPROVAL RECORD AND CERTIFICATE (PARC) PART 1 - GENERAL INFORMATION Programme title Award title Awarding Body/Institution Teaching Institution (if different) Language of Study UCAS Code Programme
More informationInitial CITP and CSci (partial fulfilment). *Confirmation of full accreditation will be sought in 2020.
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool
More informationModule Documentation
Module Documentation COMP08025 Information Systems Development Contents of this document are copyright of Galway Mayo Institute of Technology Page 1 of 5 COMP08025 Information Systems Development Short
More informationFull-Time: 4 Years, Sandwich Thick: 5 Years All LJMU programmes are delivered and assessed in English
PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Forensics Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool
More informationUnit title: Internet and Network Technology Fundamentals
Higher National Unit specification General information for centres Unit code: F204 34 Unit purpose: This Unit is designed to introduce candidates to the knowledge and understanding of services, theoretical
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Master of Computing (Hons) in Computer Security Awarding institution Teaching institution UCAS Code JACS Code Programme Duration Language of Programme Liverpool John Moores University
More informationMSc Computer Networking
School of Business Informatics and Software Engineering MSc Computer Networking PROGRAMME DOCUMENT VERSION 2.0 MCN v2.0 July 2008 University of Technology, Mauritius La Tour Koenig, Pointe aux Sables,
More informationAcademic Course Description
BEC012 - CRYPTOGRAPHY AND NETWORK SECURITY Academic Course Description BHARATH UNIVERSITY Faculty of Engineering and Technology Department of Electronics and Communication Engineering BEC012 Cryptography
More informationUnit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15
Unit 46: Network Security Unit code: D/601/1956 QCF Level 5: BTEC Higher National Credit value: 15 Aim To provide learners with opportunities to manage, support and implement a secure network infrastructure
More informationProgramme title: BSc (Hons) Forensic Archaeology and Anthropology
Faculty of Life Sciences Programme Specification Programme title: BSc (Hons) Forensic Archaeology and Anthropology Academic Year: 2017-18 Degree Awarding Body: Partner(s), delivery organisation or support
More informationForm 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010
Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) 2009/2010 s / F2V0-ITS Information Technology (Software Engineering) 6. Course Accredited by 7. QAA
More informationCSC 774 Network Security
CSC 774 Network Security Topic 2. Review of Cryptographic Techniques CSC 774 Dr. Peng Ning 1 Outline Encryption/Decryption Digital signatures Hash functions Pseudo random functions Key exchange/agreement/distribution
More informationSQA Advanced Unit specification. General information. Network Server Operating Systems. Unit code: HP2W 48. Unit purpose
SQA Advanced Unit specification General information Unit title: Network Server Operating Systems Unit code: HP2W 48 Superclass: CB Publication date: August 2017 Source: Scottish Qualifications Authority
More informationIBM Skills Academy. For <<Academy>> Career-based Education
IBM Skills Academy Providing students with a career-oriented training program on emerging technologies such as Mobile Computing, Cybersecurity, Business Analytics, Big Data, Cloud Computing, Cognitive
More informationCyber Security School
Cyber Cyber Security School FUTURE PROOF Y SECURITY TALENT "The UK needs to tackle the systemic issues at the heart of the Cyber skills shortage..." National Cyber Security Strategy 2016-2021, HM Government
More informationN/A. Engineering (MEng) July 2014
Faculty of Engineering & Informatics School of Engineering Programme Specification Programme title: MSc Mechanical Engineering Academic Year: 2017/2018 Degree Awarding Body: Partner(s), delivery organisation
More informationASSIUT UNIVERSITY. Faculty of Computers and Information Department of Information Technology. on Technology. IT PH.D. Program.
ASSIUT UNIVERSITY Faculty of Computers and Information Department of Information Technology Informatiio on Technology PhD Program IT PH.D. Program Page 0 Assiut University Faculty of Computers & Informationn
More informationMicrosoft Certified Solutions Associate 2012
Microsoft Certified Solutions Associate 2012 IT Professional Training Table of Contents Introduction... 3 Class Schedule... 3 Learning & Teaching Methods... 3 Courses Covered... 3 Course Outline... 4 1)
More informationUniversity of Moratuwa
University of Moratuwa Faculty of Information Technology Bachelor of Information Technology (BIT) External Degree Programme Administered by the Centre for Open & Distance Learning (CODL) Mode 01 Collaboration
More informationSQA Advanced Unit specification: general information. Professionalism and Ethics in Computing
SQA Advanced Unit specification: general information Unit title: Professionalism and Ethics in Computing Unit code: HP29 47 Superclass: DE Publication date: August 2017 Source: Scottish Qualifications
More informationExpected start dates September Placements 30 weeks, optional Partnership model Not applicable
KEY PROGRAMME INFORMATION Originating institution(s) Bournemouth University Faculty responsible for the programme Faculty of Science and Technology Final award(s), title(s) and credits 20 (60 ECTS) Level
More informationQuality Code for Higher Education. Application for Validation Part 1: Programme/Stage Specification Pro Forma
Quality Code for Higher Education Application for Validation Part 1: Programme/Stage Specification Pro Forma INTRODUCTION Identifiers (e.g. a, b, c etc) should be used throughout this document to indicate
More informationMSc Enterprise Security & Digital Forensics
School of Innovative Technologies & Engineering Department of Business Informatics & Software Engineering MSc Enterprise & Digital Forensics PROGRAMME DOCUMENT Version 1.0 MESDF v1.0 April 2012 University
More informationCourse Syllabus: CompTIA Network+
Course Syllabus: CompTIA Network+ Instructor: Roger Elliott Email: relliott@c-tec.edu Phone: Office: (740) 364-2299 Cell (740) 814-7504 Courseware Course #: Hours: TestOut Network Pro 4.1 CompTIA Network+
More informationPROGRAMME SPECIFICATION
PROGRAMME SPECIFICATION Bachelor of Science with Honours (SW) (Fnd) in Computer Science Awarding institution Teaching institution UCAS Code JACS Code Liverpool John Moores University LJMU Programme Duration
More informationA candidate is encouraged to use the internet in any research, etc. However, the evidence produced must be the candidate s own written words.
Higher National Unit Specification General information for centres Unit code: DV6G 34 Unit purpose: The Unit will introduce the candidate to the steps necessary to undertake secure commercial transactions
More informationPROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES
PROGRAMME SPECIFICATION POSTGRADUATE PROGRAMMES KEY FACTS Programme name Telecommunications and Networks Award MSc School School of Engineering and Mathematical Sciences Department or equivalent School
More informationSYLLABUS. DIGITAL FORENSICS WITH EnCase 7 FORENSICS. Module 1: Basic course Module 2: Automation using EnScript Module 3: Advanced course
SYLLABUS DIGITAL FORENSICS WITH EnCase 7 FORENSICS Module 1: Basic course Module 2: Automation using EnScript Module 3: Advanced course Approved by the Principal of the Norwegian Police University College
More informationSoftware Reliability and Reusability CS614
Software Reliability and Reusability CS614 Assiut University Faculty of Computers & Information Quality Assurance Unit Software Reliability and Reusability Course Specifications2011-2012 Relevant program
More informationCSC/ECE 774 Advanced Network Security
Computer Science CSC/ECE 774 Advanced Network Security Topic 2. Network Security Primitives CSC/ECE 774 Dr. Peng Ning 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange;
More informationSyllabus: The syllabus is broadly structured as follows:
Syllabus: The syllabus is broadly structured as follows: SR. NO. TOPICS SUBTOPICS 1 Foundations of Network Security Principles of Network Security Network Security Terminologies Network Security and Data
More informationPROGRAMME SUMMARY You are required to take eight core modules in terms one and two as outlined in the module list.
PROGRAMME SPECIFICATION MSc Real Estate Investment KEY FACTS Programme name Real Estate Investment Award MSc School Cass Business School Department or equivalent Specialist Masters Programme Programme
More informationProf. Bill Buchanan Room: C.63
Wireless LAN CO72047 Introduction Prof. Bill Buchanan Contact: w.buchanan@napier.ac.uk Room: C.63 Telephone: X2759 MSN Messenger: w_j_buchanan@hotmail.com WWW: http://www.dcs.napier.ac.uk/~bill http://buchananweb.co.uk
More informationUNIT OUTLINE. Network Engineering 304. Mr Iain Murray. Department of Electrical and Computer Engineering Curtin Engineering
305682 Network Engineering 304 Mr Iain Murray Department of Electrical and Computer Engineering Curtin Engineering UNIT OUTLINE Semester 2 2009 CRICOS (Perth - 00301J) (Sydney - 02637B) Table of Contents
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationStudy Programme Description
Study Programme Description Title of the study Software Engineering Official name of the institution, faculty (s) Vilnius University, Faculty of Mathematics and Informatics, Department of Software Engineering
More informationUNDERGRADUATE PROGRAMME SPECIFICATION
UNDERGRADUATE PROGRAMME SPECIFICATION Programme Title: Awarding Body: Teaching Institution: Final Awards: BSc (Hons) Computer Networks (progression award) Staffordshire University Faculty of Computing,
More informationCIBTAC LEVEL 3 CERTIFICATE IN MEDIA MAKE-UP CMC02 QAN 603/2350/4. Qualification Specification
CIBTAC LEVEL 3 CERTIFICATE IN MEDIA MAKE-UP CMC02 QAN 603/2350/4 Qualification Specification CONTENTS 1. CIBTAC... 3 2. Introduction to CIBTAC qualifications... 3 3. Level of the CIBTAC Level 3 Certificate
More informationMODULE SPECIFICATIONS
S 1. Title of the module Leading Assurance Engagements PRSN7106 2. School or partner institution which will be responsible for management of the module 3. The level of the module (e.g. Level 4, Level 5,
More informationThe Scottish Credit and Qualifications Framework and Chartered Banker Institute
The Scottish Credit and Qualifications Framework and Chartered Banker Institute Working together for Life Long Learning: SCQF and Chartered Banker Institute Lydia George, Development Officer, SCQFP Colin
More informationSECURITY SYSTEMS TECHNICIAN
SECURITY SYSTEMS TECHNICIAN Occupation Description System means a person who designs, installs, repairs, maintains, replaces, tests, services the operation of all electronic security systems in accordance
More informationKurose & Ross, Chapters (5 th ed.)
Kurose & Ross, Chapters 8.2-8.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) Addison-Wesley, April 2009. Copyright 1996-2010, J.F Kurose and
More informationSecurity and Forensic Computing
Security and Forensic Computing Module Specification 1 OUTLINE DETAILS 9 MODULE DEFINITION 10 ASSESSMENT SPECIFICATION 17 Details 17 Coursework Assignment 17 Outline Requirements 17 Marking schedule 17
More informationCity University of Hong Kong Course Syllabus. offered by Department of Computer Science with effect from Semester B 2017/18
City University of Hong Kong offered by Department of Computer Science with effect from Semester B 2017/18 Part I Course Overview Course Title: Internet Security and E-Commerce Protocols Course Code: CS4286
More informationChapter 3: Hashing. Prof Bill Buchanan OBE
Chapter 3: Hashing Hashing Types. Hashing Methods. Salting. Collisions. LM and NTLM Hashes (Windows). Hash Benchmarks. Message Authentication Codes (MACs). OTP/HOTP. Prof Bill Buchanan OBE http://asecuritysite.com/crypto03
More informationNISTCSF.COM. NIST Cybersecurity Framework (NCSF) Workforce Development Solutions
NISTCSF.COM NIST Cybersecurity Framework (NCSF) Workforce Development Solutions AGENDA The Cybersecurity Threat Landscape The Cybersecurity Challenge NIST Cybersecurity Framework NICE Cybersecurity Workforce
More informationRecent Developments in Career and Technical Education. New York State Education Department November 2016
Recent Developments in Career and Technical Education New York State Education Department November 2016 Topics Graduation Pathways- CTE and CDOS CTE Teacher Certification CTE and ESSA Graduation Pathways
More informationProgramme Specification (Master s Level)
Programme Specification (Master s Level) MSc Computing (Software Engineering) This document provides a definitive record of the main features of the programme and the learning outcomes that a typical student
More informationProgramme name Computer Science with Cyber Security
PROGRAMME SPECIFICATION KEY FACTS Programme name Computer Science with Cyber Security Award MSci (Hons) School School of Mathematics, Computer Science and Engineering Department or equivalent Department
More informationBACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY
Purdue University Global 208-209 Catalog BACHELOR OF SCIENCE IN INFORMATION TECHNOLOGY Description and Outcomes The objective of the Bachelor of Science in Information Technology program is to help you
More informationBachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001)
Bachelor of Information Technology (Course Code: C2000) Bachelor of Computer Science (Course Code: C2001) Monash College Enrolment Information 1 2019 Faculty of Information Technology Academic and Student
More informationNetwork Security
44-555 Network Security Instructor: Scott Bell Office: 2220 Colden Hall Email: sbell@nwmissouri.edu Phone: (660) 562-1699 Description: An introduction to the fundamentals of network security, including
More informationName of chapter & details.
Course Title Course Code Information Security IT707 Theory : 03 Course Credit Practical : 01 Tutorial : 00 Course Learning Outcomes Credits : 04 On the completion of the course, students will be able to:
More informationNetworking Infrastructure
Unit 43: Networking Infrastructure Unit code: A/601/1964 QCF Level 5: BTEC Higher National Credit Value 15 Aim To provide learners with an understanding of networking infrastructures, the directory based
More informationSYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Operating System Security (Windows 2008 Server) COURSE NUMBER: CIST-0254 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE
More informationCUNY John Jay College of Criminal Justice MATH AND COMPUTER SCIENCE
Instructor: Prof Aftab Ahmad Office: NB 612 Telephone No. (212)393-6314 Email Address: aahmad@jjay.cuny.edu Office Hours: By appointment TEXT & REFERENCE MATERIAL Text Notes from instructor posted on Blackboard
More informationBachelor of Information Technology (Network Security)
Course information for Bachelor of Information Technology (Network Security) Course Number HE20524 Location Meadowbank Course Design The Bachelor of Information Technology (Network Security) is a three-year
More informationHow to add value and increase income with Vendors resources
The Fifth International Workshop on Learning Methodologies and Platforms used in the Cisco Networking Academy LMPCNA 2013 March 24-29, 2013 - Lisbon, Portugal How to add value and increase income with
More informationCompTIA Security+ SY Course Outline. CompTIA Security+ SY May 2018
Course Outline 09 May 2018 Contents 1. Course Objective 2. Pre-Assessment 3. Exercises, Quizzes, Flashcards & Glossary Number of Questions 4. Expert Instructor-Led Training 5. ADA Compliant & JAWS Compatible
More informationAll LJMU programmes are delivered and assessed in English
PROGRAMME SPECIFICATION Master of Science in Computer Forensics Awarding institution Teaching institution JACS Code Programme Duration Language of Programme Subject benchmark statement Programme accredited
More informationAdvanced Crypto. Author: Prof Bill Buchanan
Advanced Crypto Bob Alice Ciphers and Fundamentals. Public key, private key and key exchange. Hashing and Authentication. Digital Certificates and Signing. Disk Encryption, Encryption Cracking and Encryption
More informationCIBTAC LEVEL 4 DIPLOMA IN SPA AND SALON MANAGEMENT CBD11 QAN 600/3328/9. Qualification Specification
CIBTAC LEVEL 4 DIPLOMA IN SPA AND SALON MANAGEMENT CBD11 QAN 600/3328/9 Qualification Specification CONTENTS CONTENTS... 2 1. CIBTAC... 3 2. Introduction to CIBTAC qualifications... 3 3. Level of the CIBTAC
More informationMSc in Information Systems
MSc in Information Systems Assoc Prof Dion Goh Programme Director WKWSCI 26 October 2018 Programme Objective To educate information systems professionals who are able to develop and manage user-centered
More informationח'/סיון/תשע "א. RSA: getting ready. Public Key Cryptography. Public key cryptography. Public key encryption algorithms
Public Key Cryptography Kurose & Ross, Chapters 8.28.3 (5 th ed.) Slides adapted from: J. Kurose & K. Ross \ Computer Networking: A Top Down Approach (5 th ed.) AddisonWesley, April 2009. Copyright 19962010,
More informationHelping shape your future
www.pwc.com/pwcacademyme Helping shape your future Project Management Professional (PMP ) PwC s Academy 2016-2017 Contents Welcome to PwC s Academy 1 About Project Management Professional (PMP ) 2 Getting
More informationThis programme is only offered at: Kazan State University for Architecture and Engineering (KSUAE)
UNIVERSITY OF EAST LONDON UNDERGRADUATE PROGRAMME SPECIFICATION BSc (Hons) Information Systems (Building & Architecture) This programme is only offered at: Kazan State University for Architecture and Engineering
More information1.264 Lecture 28. Cryptography: Asymmetric keys
1.264 Lecture 28 Cryptography: Asymmetric keys Next class: Anderson chapters 20. Exercise due before class (Reading doesn t cover same topics as lecture) 1 Asymmetric or public key encryption Receiver
More informationASTON UNIVERSITY PROGRAMME SPECIFICATION
ASTON UNIVERSITY PROGRAMME SPECIFICATION Programme Title UCAS/JACS School/Subject Area Final Award Interim Awards Mode(s) of Study Normal Length of Programme Total Credits Programme Accredited By Dates
More informationForm 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008)
Form 18 Heriot-Watt University Graduate/Postgraduate Course Structure and Course Notes Template (RAY) Version 3.0 (2007/2008) 1. Course Codes 3. School/Institute Mathematical & Computer Sciences (University
More informationCryptography (Overview)
Cryptography (Overview) Some history Caesar cipher, rot13 substitution ciphers, etc. Enigma (Turing) Modern secret key cryptography DES, AES Public key cryptography RSA, digital signatures Cryptography
More informationCourse Intended Learning Outcomes (CILOs): Upon successful completion of this course, students should be able to:
Title (Units): COMP 7330 Information Systems Security & Auditing (3,3,0) Course Aims: Prerequisite: To introduce the fundamental concepts and techniques in computer and network security, giving students
More informationSYLLABUS. Departmental Syllabus CIST Departmental Syllabus. Departmental Syllabus. Departmental Syllabus. Departmental Syllabus
SYLLABUS DATE OF LAST REVIEW: 02/2013 CIP CODE: 11.0901 SEMESTER: COURSE TITLE: Advanced System Manager (Windows 2008 Network) COURSE NUMBER: CIST-0218 CREDIT HOURS: 4 INSTRUCTOR: OFFICE LOCATION: OFFICE
More informationAcademic Program Review Cyber Security College of Southern Nevada 2017
Academic Program Review Cyber Security College of Southern Nevada 2017 ACADEMIC EVALUATION WORKSHEET PROGRAM ASSESSMENT DATA Date Submitted: Submitted by: Margaret Taylor PROGRAM Assessment Data to be
More informationSECTION 4: OUTCOME MEASURE 6 Multiple Documents: Initial Level: TExES State Content Exam Data Chart
SECTION 4: OUTCOME MEASURE 6 Multiple Documents: Initial Level: TExES Content Exam 2016-2017 Data Chart Initial Level: TExES Pedagogy and Professional Responsibilities Standards Exam 2016-2017 Data Chart
More informationCity University of Hong Kong Course Syllabus. offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018
City University of Hong Kong Course Syllabus offered by College/School/Department of Electronic Engineering with effect from Semester B in 2017/2018 Part I Course Overview Course Title: Cloud Computing
More informationITT Technical Institute. TB143 Introduction to Personal Computers Onsite and Online Course SYLLABUS
ITT Technical Institute TB143 Onsite and Online Course SYLLABUS Credit hours: 4 Contact/Instructional hours: 50 (30 Theory Hours, 20 Lab Hours) Prerequisite(s) and/or Corequisite(s): None. Course Description:
More informationCryptographic Systems
CPSC 426/526 Cryptographic Systems Ennan Zhai Computer Science Department Yale University Recall: Lec-10 In lec-10, we learned: - Consistency models - Two-phase commit - Consensus - Paxos Lecture Roadmap
More informationProgression from this unit could be to J0HB 34 Penetration Testing to test the effectiveness of the firewall and its configuration.
Higher National Unit Specification General information Unit code: J0SA 34 Superclass: CB Publication date: June 2018 Source: Scottish Qualifications Authority Version: 01 Unit purpose The purpose of this
More informationSchool of Computing and Mathematics. Integrated Master s MComp Computer Science. Programme Specification
School of Computing and Mathematics Integrated Master s MComp Computer Science Programme Specification Information for students: the programme specification is the definitive document summarising the structure
More informationEducator Learning Journeys. Tracy Immel Global Director Teacher Professional Development Programs & Certification
Educator Learning Journeys Tracy Immel timmel@microsoft.com Global Director Teacher Professional Development Programs & Certification A Partnership Approach to Education Reform Set Vision and Define Priorities
More information